Home
Course description
Lecture notes
Assignments
Projects
Tools
Reference

CS 395T  Design and Analysis of Security Protocols (54302)
Fall 2004
Lecture notes

Course outline. NeedhamSchroeder publickey protocol.
Introduction to Murphi.
[PDF]

SSL/TLS case study.
[PDF]

Overview of IP security. Internet Key Exchange (IKE)
protocol and predecessors.
[PDF]

Introduction to process algebra. Modeling security
protocols in process calculi.
[PDF]

Just Fast Keying (JFK) protocol.
[PDF]

Security as observational equivalence.
JFK protocol in applied pi calculus.
[PDF]

Protocols for anonymity.
[PDF]

Probabilistic model checking.
[PDF]

Probabilistic contract signing.
[PDF]

Compositional protocol logic.
[PDF]

Inductive method. Analyzing SET with the inductive method.
[PDF]

Symbolic constraint solving for security protocols.
[PDF]

Formal definitions of security for symmetric ciphers.
[PDF]

Formal model for secure key exchange.
Simulatabilitybased proofs of protocol security.
[PDF]

Probabilistic polynomialtime process calculus.
[PDF]

Computational soundness of formal models.
[PDF]

Fair exchange and contract signing protocols.
[PDF]

Gamebased verification of contract signing protocols.
[PDF]

Universal composability framework (presented by Glen Nuckolls).
[PDF]
Student projects
Student presentations
